pwshub.com

Beware of fake CrowdStrike domains delivering Lumma Stealer

CrowdStrike is the latest lure being used to trick Windows users into downloading and running the notorious Lumma infostealing malware, according to the security shop's threat intel team, which spotted the scam just days after the Falcon sensor update fiasco.

Infostealers such as Lumma scour infected machines for any stored sensitive info, such as site login details and browser histories. This data is then quietly exfiltrated to the malware's operators to use for fraud, theft, and other crimes.

More specifically, this stolen information is used to gain illicit access to victims' online bank accounts and cryptocurrency wallets, along with email inboxes, remote desktop accounts, and other apps and services that require legitimate login credentials, which makes this type of malware especially popular among cyber-crooks.

Lumma is a relatively popular stealer that has been in high demand among ransomware crews since 2022. It's also one of the infostealers that Mandiant says the criminal gang UNC5537 used to obtain credentials that were then used to break into Snowflake cloud storage environments earlier this spring.

In the CrowdStrike campaign, the Lumma build timestamp "indicates the actor highly likely built the sample for distribution the day after the single content update for CrowdStrike's Falcon sensor was identified," the security shop noted.

The domain, crowdstrike-office365[.]com, was registered on July 23, just days after CrowdStrike's July 19 faulty update crashed 8.5 million Windows machines. It speculates that the group behind the domain is linked to earlier social-engineering attacks in June, which also distributed the Lumma malware. 

In these earlier infostealer campaigns, the miscreants spammed out phishing emails, and then followed up with phone calls purporting to be from a Microsoft Teams helpdesk employee.

"Based on the shared infrastructure between the campaigns and apparent targeting of corporate networks, CrowdStrike Intelligence assesses with moderate confidence that the activity is likely attributable to the same unnamed threat actor," the CrowdStrike team reports.

  • Cybercrooks spell trouble with typosquatting domains amid CrowdStrike crisis
  • Cybercriminals quickly exploit CrowdStrike chaos
  • The months and days before and after CrowdStrike's fatal Friday
  • CrowdStrike Windows patchpocalypse could take weeks to fix, IT admins fear

The fake CrowdStrike domain attempts to trick users into clicking on and fetching a .zip file purporting to be a recovery tool to fix the boot loop caused by the bad sensor update. The archive contains a Microsoft Installer file, WidowsSystem-update[.]msi, which is actually a malware loader. 

After the loader is executed by the mark, it drops and runs self-extracting RAR file, plenrco[.]exe, that has a Nullsoft Scriptable Install System (NSIS) installer with the filename SymposiumTaiwan[.]exe. This file includes some code fragments of a legitimate AutoIt executable that is heavily obfuscated, and will terminate if the victim's machine is running antivirus software.

But assuming the coast is clear, and the malware can continue undetected, the AutoIt loader runs one of two shellcodes, depending on if its a 32 or 64-bit system, and ultimately deploys the Lumma malware.

Just hours after CrowdStrike's dodgy sensor update sent Windows machines into a BSOD spiral, reports surfaced of scam emails using the outage as a lure and claiming to come from CrowdStrike Support or CrowdStrike Security. The security biz claims that 97 percent of effected systems are now back online. ®

Source: theregister.com

Related stories
1 month ago - CrowdStrike reminded the public that BSODs still exist. Their origins go back decades Veteran Microsoft engineer Raymond Chen has taken to his Old New Thing blog to clear up an apparent mystery regarding the origins of the infamous...
1 month ago - Leaves a trail of ransomware infections, data theft, business email compromise in its wake Insight The developers of EvilProxy – a phishing kit dubbed the "LockBit of phishing" – have produced guides on using legitimate Cloudflare...
1 month ago - And reveals the small mistake that bricked 8.5M Windows boxes CrowdStrike has hired two outside security firms to review the Falcon functionality that sparked a global IT outage last month – but it may not have an awful lot to find,...
1 month ago - They DKIM here, they DKIM there A huge phishing campaign exploited a security blind-spot in Proofpoint's email filtering systems to send an average of three million "perfectly spoofed" messages a day purporting to be from Disney, IBM,...
1 month ago - Malware logs users' keystrokes, pilfers credentials, exfiltrates data Criminals are preying on Windows users yet again, this time in an effort to hit them with a keylogger that can also steal credentials and take screenshots.…
Other stories
12 minutes ago - We tested multiple types of adjustable dumbbells, and these are the ones that made the cut.
12 minutes ago - More states are offering the ability to change your Medigap coverage to purchase a cheaper plan without a physical exam.
12 minutes ago - Why You Can Trust CNET Our expert, award-winning staff selects the products we cover and rigorously researches and tests our top picks. If you buy...
12 minutes ago - Revised App Review Guidelines are now being applied to iPadOS 18, the latest version of its iPad-exclusive operating system. The OS will give European users the ability to access apps from third-party sources beyond the traditional App...
12 minutes ago - Doom's Henchmen face off against Allies of the Avengers in the new game mode that'll arrive in Fortnite on Sept. 17.